关注
Farrukh Aslam Khan
Farrukh Aslam Khan
在 ksu.edu.sa 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
A Novel Two-Stage Deep Learning Model for Efficient Network Intrusion Detection
FA Khan, A Gumaei, A Derhab, A Hussain
IEEE Access, 2019
3482019
A comprehensive survey on security in cloud computing
G Ramachandra, M Iftikhar, FA Khan
Procedia Computer Science 110, 465-472, 2017
2392017
Securing critical infrastructures: deep-learning-based threat detection in IIoT
K Yu, L Tan, S Mumtaz, S Al-Rubaye, A Al-Dulaimi, AK Bashir, FA Khan
IEEE Communications Magazine 59 (10), 76-82, 2021
2152021
Energy-efficient clustering in mobile ad-hoc networks using multi-objective particle swarm optimization
H Ali, W Shahzad, FA Khan
Applied Soft Computing 12 (7), 1913-1928, 2012
1902012
Blockchain and smart healthcare security: a survey
N Tariq, A Qamar, M Asim, FA Khan
Procedia Computer Science 175, 615-620, 2020
1532020
KDD cup 99 data sets: A perspective on the role of data sets in network intrusion detection research
K Siddique, Z Akhtar, FA Khan, Y Kim
Computer 52 (2), 41-51, 2019
1482019
Blockchain and random subspace learning-based IDS for SDN-enabled industrial IoT security
A Derhab, M Guerroumi, A Gumaei, L Maglaras, MA Ferrag, M Mukherjee, ...
Sensors 19 (14), 3119, 2019
1452019
Intrusion detection systems for wireless sensor networks: A survey
AH Farooqi, FA Khan
International Conference on Future Generation Communication and Networking …, 2009
1202009
An innovative optimization strategy for efficient energy management with day-ahead demand response signal and energy consumption forecasting in smart grid using artificial …
G Hafeez, KS Alimgeer, Z Wadud, I Khan, M Usman, AB Qazi, FA Khan
IEEe Access 8, 84415-84433, 2020
1092020
Intrusion detection system for internet of things based on temporal convolution neural network and efficient feature engineering
A Derhab, A Aldweesh, AZ Emam, FA Khan
Wireless Communications and Mobile Computing 2020 (1), 6689134, 2020
1062020
Malicious AODV: implementation and analysis of routing attacks in MANETs
H Ehsan, FA Khan
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
1042012
A cloud-based healthcare framework for security and patients’ data privacy using wireless body area networks
FA Khan, A Ali, H Abbas, NAH Haldar
Procedia Computer Science 34, 511-517, 2014
992014
A hybrid technique using binary particle swarm optimization and decision tree pruning for network intrusion detection
AJ Malik, FA Khan
Cluster Computing 21, 667-680, 2018
982018
Arrhythmia classification using Mahalanobis distance based improved Fuzzy C-Means clustering for mobile health monitoring systems
NAH Haldar, FA Khan, A Ali, H Abbas
Neurocomputing 220, 221-235, 2017
832017
Malicious insiders attack in IoT based Multi-Cloud e-Healthcare environment: A Systematic Literature Review
A Ahmed, R Latif, S Latif, H Abbas, FA Khan
Multimedia Tools and Applications 77, 21947-21965, 2018
822018
Network intrusion detection using hybrid binary PSO and random forests algorithm
AJ Malik, W Shahzad, FA Khan
Security and Communication Networks 8 (16), 2646-2660, 2015
762015
Energy-efficient cluster-based security mechanism for intra-WBAN and inter-WBAN communications for healthcare applications
A Ali, FA Khan
EURASIP Journal on Wireless Communications and Networking 2013, 1-19, 2013
742013
A novel hybrid load forecasting framework with intelligent feature engineering and optimization algorithm in smart grid
G Hafeez, I Khan, S Jan, IA Shah, FA Khan, A Derhab
Applied Energy 299, 117178, 2021
732021
Toward an optimal solution against denial of service attacks in software defined networks
M Imran, MH Durad, FA Khan, A Derhab
Future Generation Computer Systems 92, 444-453, 2019
672019
Detection and prediction of diabetes using data mining: a comprehensive review
FA Khan, K Zeb, M Al-Rakhami, A Derhab, SAC Bukhari
IEEE Access 9, 43711-43735, 2021
642021
系统目前无法执行此操作,请稍后再试。
文章 1–20